Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PEGACPLSA88V1 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PEGACPLSA88V1 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certified Pega Lead System Architect (CPLSA) Exam 8.8
  • Last Update: Sep 12, 2025
  • Questions and Answers: 238
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PEGACPLSA88V1 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PEGACPLSA88V1 Practice Exam Questions with Answers Certified Pega Lead System Architect (CPLSA) Exam 8.8 Certification

Question # 6

Pega Customer Decision Hub enables organizations to make Next-Best decisions. To which type of a decision is Next-Best-Action applied?

A.

Optimizing supply chain management

B.

Determining how to optimize inventories

C.

Determining if a borrower gets a loan

D.

Predicting the time of a machine failure

Full Access
Question # 7

BigCo has two development projects currently in progress developed by independent teams. One team builds the Quoting application. Another team builds the Policy Administration application. Development takes place on different servers.

The Quoting application is built on the Policy Administration application.

The Policy Administration application requires enhancements to support other areas of the business.

The Quoting team is notified when the Policy Administration application is versioned. The Quoting team responds by importing a RAP containing the new version.

Select the two best practices that minimize potential development conflicts and work with the most current version of the Policy Administration application. (Choose Two)

A.

Perform branch reviews when merging branches.

B.

Share rulesets between both applications.

C.

Switch between applications when modifying rules.

D.

Periodically sync the Policy Administration application code.

Full Access
Question # 8

U+ Bank implemented a customer journey for its customers. The journey consists of three stages. The first stage raises awareness about available products, the second stage presents available offers, and in the last stage, customers can talk to an advisor to get a personalized quote. The bank wants to actively increase offers promotion over time.

What action does the bank need to take to achieve this business requirement?

A.

Upweight the propensity by adding more predictors that fit the target customers and repeat this process over time.

B.

Enable increasing stage upweighting for the second stage of the journey.

C.

Enable increasing stage upweighting for the first stage of the journey.

D.

Enable constant stage upweighting for the second stage of the journey.

Full Access
Question # 9

A pega application has cases that represent customer accounts each with many members.

When a member of a customer account registers with the application through an offline

component, a related registration transaction is recorded. An advanced agent updates the

customer account cases with new members. The application is running in a multimode

system and advanced agents are enabled on all nodes. Which two elements are valid design

choices? (choose two)

A.

Use the optimistic locking option on the case types.

B.

Create a Registration subcase configured to run in offline mode.

C.

Leverage the default object lock contention requeuing capability.

D.

Override DetermineLockString to use .AccountID instead of .pyID as the lock string.

Full Access
Question # 10

Your team is developing a Quoting application for BigCo. The team is developing a Policy Administration application. The Quoting application is built on the Policy Administration application. The Policy Administration application requires enhancements to support other areas of the business. These enhancement take place during the same time frame as the Quoting application development.

Select the two practices for your team to follow to minimize potential development conflicts. (Choose Two.)

A.

Share rule sets between both application

B.

Switch application when modifying rules.

C.

Perform branch reviews when merging branches.

D.

Periodically rebase the policy Administrator application

Full Access
Question # 11

U+ Bank wants to offer credit cards only to customers with a low-risk profile. The customers are divided into various risk segments from AAA to CCC. The risk segmentation rules that the business provides use the Age and the customer Credit Score based on the following table. The bank uses a scorecard model to determine the customer Credit Score.

PEGACPLSA88V1 question answer

As a decisioning architect, how do you Implement the business requirement?

A.

Add a decision table to a decision strategy and reference it in the scorecard component.

B.

Add the risk segmentation rules in the Results tab of the scorecard rule.

C.

Add a decision table to a decision strategy and pass the credit score as the parameter.

D.

Add three contact policies that correspond to the three risk segments.

Full Access
Question # 12

Case Type A and Case Type B capture information about multiple line items. Each line item is an Instance erf the same Line Item data type. Separate work pool classes are used for Case Types A and B.

What is the optimal data model design to meet these requirements?

A.

Add a CaseTypeRef property to the Line Item data type. Case Types A and B possess a Query (tisf Uneltem) property. This List Query property sources a D_UneltemList data page that accepts a pylD parameter.

B.

Add a CsseTypeRef property, an ObjClass property, and Query property related to the Line Item data type. The Query property sources a Lookup Data Page that accepts ObjClass and CaseTypeRef parameters.

C.

Add CaseTypeARef and CaseTypeBRef properties to the Line Item data type. The CaseTypeARef property is a case reference to Case Type A. The CaseTypeBRef property is a case reference to Case Type B.

D.

Case Types A and B both possess an embedded list of line items. Define a Declare Index against each embedded list. Change the direct inheritance class for each Declare Index class to the Line Item data type.

Full Access
Question # 13

The application contains a property named claimid. You want to business users to reuse this property in any new case types they create. How do you define the claimid property?

A.

As a final rule

B.

As a case level property

C.

As an enterprise class level property

D.

As a relevant record

Full Access
Question # 14

Table a contains customer information. Table B contains complaints submitted by customers. Table C contains positive feedback submitted by customer.

You are tasked to write a report that list all rows in Table A where, per customer, the number of rows in Table B related to Table A are greater than the number of rows in Table C related to table A.

Which method creates the report that executes with the best performance?

A.

Define two subreports: one that counts rows in Table B relative to Table A, and on that counts the rows in table C relative to Table A. Only include rows in the main. Report against table A where the table B count is greater that the Table C count.

B.

Join table A to Table B and C using include all rows in this class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

C.

Join table A to Table B and C using include all rows in join class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

D.

Define two subreports, one where table B users ''Do not Join'', and one where Table C users ''Do not Join'', In the main report count the rows from each subpreport, then only include rows where the count from the Table B subreport than the count from the Table C subreport.

Full Access
Question # 15

A decisioning architect wants to use the customer properties income and age in a Filter component. Which decision component is required to enable access to these properties?

A.

Data Import

B.

None, properties are available

C.

Set Property

D.

Proposition Data

Full Access
Question # 16

How do you improve performance during synchronization for users of an offline-enable mobile app.

A.

Use only node-scope data pages for reference data

B.

Configure optimistic locking on offline-enabled cases.

C.

Restrict the number of offline-enable access group

D.

Declare large data pages in the data page whitel

Full Access
Question # 17

In a decision strategy, to use a customer property in an expression, you

A.

define the property as a strategy property

B.

prefix the property with the keyword Customer

C.

use the property as defined without any prefix

D.

define Customer page in Pages & Classes

Full Access
Question # 18

MyHealth Corporation wants to use the age of the claim to increase the urgency of the assignment so that persons processing the claims work on the most urgent claims first. The claim assignment urgency increases by 1 each day the claim remains in an Unresolved status. At any time, MyHealth has up to 10,000 claims that are in process. Claims in the PendingProcessing workbasket are subject to this calculation. The application updates the claim urgency daily before the work day begins. All claims are processed within 30 days.

Which approach satisfies the claim urgency requirement and provides the best experience for the user who processes the claims?

A.

Use the service-level agreement of the case to increase the value of pyUrgencyAssignAdjust by 1. Reset the goal date to the following day.

B.

Use a declare expression to increment the value of pyUrgencyAssignAdjust by 1. When a user who processes claims opens the assignment, the urgency is increased by 1.

C.

Use a job scheduler on a dedicated node to increase the value of pyUrgencyAssignAdjust by 1 for every assignment that matches the selection criteria.

D.

Use the service-level agreement of the assignment to increase the value of pyUrgencyAssignAdjust by 1 every day the claim is in an Open status.

Full Access
Question # 19

A Citizen Developer working on a Claims case type wants to validate the BenefitType property value. This property is located on a Clipboard page named ClaimBenefit of the MyCo-Data-ClaimBenefit class, which is inherited from Data-.

As a Lead System Architect, what do you recommend to make this validation available to the Citizen Developer?

A.

A System Architect should create a When rule in Dev Studio and reference the ClaimBenefit Clipboard page on the Pages it Classes tab. They define and implement the required criteria, because it is not possible to make it available for Citizen Developers.

B.

A System Architect should create a property BenefitType in the work class and copies the BenefitType property value from the ClaimBenefit Clipboard page to pyWorkPage. Citizen Developers can check the criteria on work class BenefitType property.

C.

A Citizen Developer uses any existing property and informs the system architect to implement a constraint rule. The System Architect marks the constraint rule as a relevant record, to make it visible to the Citizen Developer.

D.

A System Architect should create a When rule in Dev Studio and reference the ClaimBenefit Clipboard page on the Pages file Classes tab. They mark the rule as a relevant record so that the rule becomes available to Citizen Developers.

Full Access
Question # 20

Which three approaches arc considered a PegaUnit: testing best practice? (Choose Three)

A.

A test ruleset is placed at the top of an application's ruleset stack.

B.

A test case uses limited assertions.

C.

A test case groups relevant asseitions together.

D.

A test case is not necessary when an error message is the expected result.

E.

A test case focuses on a single area of functionality.

Full Access
Question # 21

An organization wants to know about failed authentication attempts to gain access to a Pega Platform application. How do you log information about unauthorized access or failed login attempts?

A.

Enable the content security policy and generate the required reports of failed login.

B.

Integrate with third-party security tools to find the failed login.

C.

Enable the security audit and get the information related to failed login.

D.

Add a utility to the session management operations.

Full Access
Question # 22

In the answer area, select the configuration for back-to=back processing on the follow action form so that getnextwork processing does not occur.

A.

Look for the assignment to perform.

B.

If not found, look for other assignment in flows on this case

C.

If not found, look for assignment in flows on the parent case

D.

For each also consider assignments in workbaskets

Full Access
Question # 23

XYZ Corporation wants to perform extensive analysis on work party information across various case types in near real time. At the same time, XYZ wants to minimize the impact this analysis has on case workers using Pega applications.

Choose two options that would contribute to viable solutions. (Choose Two)

A.

Use Pega API RCST services to update Case and Work Party data in a reports database.

B.

Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records.

C.

Define additional database indexes for the Class Group and related Work Party tables.

D.

Use BIX to export Case and related Work Party data to a data warehouse.

Full Access
Question # 24

Security policies need to be configured for a newly developed Pega application using basic credential authentication. The lockout policy configuration must lock out users after three failed login attempts. The configuration must exclude Administrator or Executive operators from the lockout.

How do you achieve this requirement?

A.

Define operator override setting in enterprise authentication system

B.

Create a separate role for Admin Executives

C.

Use Exclude Operators options in Security Policies landing page

D.

Define Access Control Policy to exclude Admin Executives

Full Access
Question # 25

You are using pega express. You want to avoid creating unnecessary case-level properties

and views. Which three actions do you take to accomplish this goal? (choose three)

A.

Define case type views using *\ page, property" syntax for the majority of the- fields.

B.

Drag-and-drop a Field Group when defining a case view.

C.

Create a data type that corresponds to each case type.

D.

Pre-define properties, sections, and relevant records that are applied to Work-Cover'.

E.

Add an embedded Page property to the case type.

Full Access
Question # 26

A recent review of the audit polices log show that a specific IP address has made a large number of failed login attempts within a few minutes you suspect that it is an internet bot attack

Select two options you can configure to prevent the bot from accessing you application

A.

Enable the CAPTCHA security policy

B.

Enable an authentication lockout policy

C.

Enable a contect security policy

D.

Enable a failed login attempts security event

Full Access
Question # 27

An insurance company wants to extend a native mobile app to allow customers to create claims using a claims management application implemented on the pega platfrom. As a claim is processed, update are sent to the mobile app as push notifications.

How do you satisfy this requirement ?

A.

Package the claims management application as a SDK mobile app

B.

Configure a service to creat claim cases when called from the native mobile app

C.

configure the native mobile app to creat a claim case using the page API

D.

Embed the claims management application in the native mobile app using a pega web Mashup gadget

Full Access
Question # 28

Given the following classes and properties:

myco-data-shape (abstract)

area

color

myco-data-shape-rectangle

length

width

myco-data-shape-circle

radius

a page list property .shapes is defined as being of the abstract class myco-data-shape.

select two correct statements. (choose two)

A.

a rule defined in myco-data-shape-rectangle can modify the. Color property.

B.

pages of shapes can contain. length and. Radius.

C.

A rule existing in myco-data-shape can be overridden in myco-data-shape-circle.

D.

pages of .Shapes can be of either myco-data-Shape-rectangle or myco-data-shape-circle, but all pages must be the same.

Full Access
Question # 29

What is the primary reason for developing a set of unit test cases and automated testing suites in a continuous integration and continuous deployment (CI/CD) model?

A.

Automated testing reduces costs by reducing the need to hire and train testing resources.

B.

Automated testing programmatically ensures quality of rules to maintain the integrity of the pipeline.

C.

Automated testing accelerates the deployment of rules from the development environment to target environments.

D.

Automated testing assists orchestration between automation server and the Execute Test REST service.

Full Access
Question # 30

A duplicate case search contains two weighted conditions in which a property value in the current case is compared to the same property value in the existing case. After processing multiple cases that have two matching data values, duplicate case search does not identify any duplicates.

What two approaches do you take to diagnose the cause? (Choose two.)

A.

Verify that there are no more than 4 maximum weighted conditions being tested.

B.

Verify that the total weights of the matching conditions match or exceed the threshold.

C.

Verify that each of the basic conditions are satisfied.

D.

Verify that the case type is instantiated as a temporary case so the case can be cancelled.

Full Access
Question # 31

The BigCo quoting application is currently on-premise. BigCo plans to move the application to Pega Cloud What factor do you need to consider for environment setup?

A.

Network security configuration

B.

Database access configuration

C.

System management application configuration

D.

Log file access configuration

Full Access
Question # 32

what configuration is required to control which nodes in a cluster an agent runs.?

A.

assign the agent to a specifie category.

B.

associate the agent to specific node type.

C.

use a custom queue for the agent

D.

create agent schedules on applicable nodes.

Full Access
Question # 33

An application is being constructed In multiple phases for a growing company that has over 1000 employees. During the initial development stages, it is determined a button on a section has to be made conditionally visible based on a group of actors.

What should the conditional visibility be based on to minimize the amount of future maintenance?

A.

Privilege

B.

AccessGroup

C.

Role

D.

Work group

Full Access
Question # 34

Select the primary reason for developing a set of unit lest cases and automated testing Suites in a continuous integration and continuous deployment (CI/CD) model.

A.

Automated testing reduces costs by reducing the need to hire and I rain testing resources.

B.

Automated testing accelerates the deployment of rules from the development environment to target environments.

C.

Automated testing programmatically ensures quality of rules to maintain the integrity of the pipeline.

D.

Automated testing allows for orchestration between automation server and the Execute Test REST service.

Full Access
Question # 35

How do you identify if a result in a decision rule cannot be returned?

A.

Test for missing conditions

B.

Test for completeness

C.

Test the rule using a unit test

D.

Test for conflicts

Full Access
Question # 36

Items selected by a user need to be copied to a page list property when the user submits the form.

How do you copy the items?

A.

Create a validate rule to copy the selected items.

B.

Create a declare expression with the page list property as the target.

C.

Add a data transform to the flow action as a pre-processing action.

D.

Add a data transform to the flow action as a post-processing action.

Full Access
Question # 37

XYZ Corporation would like a report that shows the number of employees who have been with the company more than 20 years, between 15 and 20 years, between 10 and 15 years, between 5 and 10 years, and less than 5 years.

How do you implement this report using Pega?

A.

Use a SQL Function.

B.

Use a listView with a custom getContent Activity.

C.

Use a correlated subreport.

D.

Use a Connect-SQL rule.

Full Access
Question # 38

When do you use the load-datapage activity method?

A.

To refresh a data page

B.

To queue the data page for a default agent

C.

To initiate the loading of a data page

D.

To run a connector asynchronously

Full Access
Question # 39

a performance analysis for an equals-comparisons-only query against a table shows that it always performas a full table scan. the table has grown steadily over time. nothing has been done in the database concerning this table other than it being generated by pega.

A.

limit the number of rows fetched from this table,

B.

add one or more column indexes to this table.

C.

Expose one or more columns within this table.

D.

alter one or more column types in the table.

Full Access
Question # 40

XYZ Inc.'s COE wants case life cycle developers to use a field group named "Claim" regardless of the application being developed.

Select and move the three tasks that the COE performs for this requirement to the Task List column and place them in the correct order. (Choose Three)

PEGACPLSA88V1 question answer

Full Access
Question # 41

One of the important requirements of Pega Web Mashup is to ensure that the same-origin policy is following.

From the following options, select two valid configurations. (Choose TWO)

PEGACPLSA88V1 question answer

A.

Configuration A

B.

Configuration B

C.

Configuration C

D.

Configuration D

Full Access
Question # 42

To access a property from an unconnected component, you use the______________.

A.

customer-dot-property construct

B.

property value

C.

dot-property value directly

D.

component-dot-property construct

Full Access
Question # 43

Which of the following Skin rule customizations help satisfy the states requirements?

A.

In the Skin rule, configure the importance field for each column included in a repeating layout.

B.

In the Skin rule, configure the Column Layout and specify the width of the sidebar on desktops.

C.

In the Skin rule, configure the Column Layout and specify how the sidebar appears on tables and smart phones.

D.

In the Skin rule, configure the style for all application field values, paragraphs, and correspondence records.

Full Access
Question # 44

Using the information shown in the Class structure, select the correct statement.

A.

Auto must be a subcase of Parking.

B.

Instances of EventBooking and Hosted can be stored in a separate.

C.

EventBooking cannot be a subcase of Auto.

D.

Parking and Auto instances must be stored in the same table.

Full Access
Question # 45

U+ Bank currently uses a Pega Platform'" application to automate its internal operations. The bank wants to add independent tax processing functionality to its application. This work should be routed to tax consultants in the application.

To support this new feature, the bank has appointed country-specific tax consultants because tax processing is handled differently in different countries.

Which one of the following options is the best approach to add tax processing to the bank's existing Pega Platform application?

A.

Create a tax case type, then circumstance the required processes and routing utilities by using the country property.

B.

Create a country-specific tax assessment application that is built on the existing Pega Platform application.

C.

Create a tax case type and use case type specialization by country, each with its own process, to be routed and assigned to the appropriate tax consultant.

D.

Create a country-specific tax process for tax assessment that is routed to the appropriate tax consultant.

Full Access
Question # 46

You oversee a medium-size development team, and some of the team members are new to

pega. What are the most efficient ways to ensure that the rules the team creates adhere to

best practices? (choose two)

A.

Have new team members create and run Pega automated unit tests against their rules.

B.

Use Pega Log Analyzer to identify exceptions associated with the new team members.

C.

Run Tracer on each rule the new team members check in to identify an failures in rule execution.

D.

Leverage the rule check-in approval process to review the new team member’s changes first.

Full Access
Question # 47

A company is planning to build an application that can capture information about individuals in different roles, who work for different companies, in different parts of the world.

Future independent Pega Platform'* applications that can potentially use that same information are also being planned. Every application, including the first one, has a tight delivery schedule.

How do you design the data model?

A.

Extend existing core Pega Platform classes such as Data-Party-Person, Data-Party-Corn, and Data-Address-Postal, persisting instances of the extended classes in the PegaData schema.

B.

Extend existing core Pega Platform classes such as PegaData-Contact, PegaData-Organization, and PegaData-Address, persisting instances of the extended classes in the CustomerData schema.

C.

Create the minimum number of properties necessary to describe a person, organization, and address within the ORG-Data class. Share the ORG ruleset with other applications.

D.

Define new Person, Organization, and Address Data classes that extend ORG-Data. Persist Person in the PegaData schema, and Organization and Address in the CustomerData schema.

Full Access
Question # 48

APP Studio created a data type in the Organization layer for Quote data called BCO-Data-Quote. How do you help users find rules from this data class when working in APP Studio?

A.

Create a BCO-QI-Data-Quote class that inherits from BCO Data-Quote.

B.

Use a Data Reference to configure the rules that you need from the BCO Data Quote class.

C.

Copy the fields in the data class to the BCO-QT Work- class so all subclasses can see the Quote rules.

D.

Select each rule you want to reuse in the application as a relevant record.

Full Access
Question # 49

At XYZ Corp, multiple ClaimUnit sub case types are spun off from a parent Claim case. User retrieve ClaimUnit assignment using Get Next Work based on the average time to resolve each sub case type. Assignments associated with sub case types that tale longer to resolve on average should be retrieve first. The average time to resolve sub case types will change over time. How do you design the solution to handle this requirement?

A.

Increase subcase urgency based on ClaimUnit type prior to the workbasket assignment. Specialize the Service Level Rule by ClaimUnit case type.

B.

When the SLA's goal is reached, have an escalation Activity adjust the claim urgency in proportion to the average time to resolve ClaimUnit cases.

C.

Implement a GetNextWork solution based on case deadline and ClaimUnit type. Specialist the service Level Rule by ClaimUnity case type.

D.

Store the average time to complete sub case types in a table. Customize GetNextWork list view by joining to this table and use this value for ordering the results.

Full Access
Question # 50

How do you begin your research to diagnose the cause of the reported performance issue?

A.

Look at the performance profile and DB Trace out put from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Full Access
Question # 51

set the three security tasks you perform when deploying an application to a production environment. (Choose Three)

A.

Delete the Unauthenticated access group.

B.

Restrict access to ruleset configuration.

C.

Change the Rule security mode setting on the access groups to Deny.

D.

Rename the PRServlet default servlets.

E.

Update standard dynamic system settings.

Full Access
Question # 52

Select and move the three option that are required to enable to access to the client clipboard in a mobile app to the configuration column and place them in the correct order

PEGACPLSA88V1 question answer

Full Access
Question # 53

In the first step in a case type, the user compares data on a form to the data on a customer account. If the data matches, the case is resolved. If the data does not match, the user advances the case to update the account.

Management only wants a record of the cases that update an account. What two configuration options do you use to implement this requirement? (Choose two.)

A.

Add a Persist Case shape after the first step.

B.

Apply a when condition to the first step to persist only cases requiring updates.

C.

Configure the starting flow to instantiate the case type as a temporary case.

D.

Configure the first step to instantiate the case type as a temporary case.

Full Access
Question # 54

A shipping case needs to wait a specific time period before progressing in its flow. The developer is considering using a wait shape or an assignment with an SLA to perform this function.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

A.

Adjust the case urgency when the assignment is created-

B.

Manually step past the waiting point prior to the designated time.

C.

Present a custom UI form to the user while waiting to expire.

D.

Automatically bypass locking when the assignment is created.

Full Access
Question # 55

BigCo is planning an update to JVM settings on all production nodes at the of the month. The production application supports high availability.

To ensure that users can continue working without distribution while the JVM changes are in process, select and move all of the following tasks to the Task List Order column arrange then correct order.

PEGACPLSA88V1 question answer

Full Access
Question # 56

An end user of the application experienced a browser crash while working on a highly available system. Crash recovery is enabled. Does the user to be reauthenticated?

A.

Yes, if the user is directed to the same node.

B.

No, if the user is directed to a different node.

C.

Yes, If the authentication cookie was lost.

D.

No, if the authentication cookie was lost

Full Access
Question # 57

What advantage does a rule-utility-function have over a rule-obj-activity?

A.

Ability to be circumstanced

B.

Ability to be saved multiple rulesets

C.

Ability to be directly called from a decision table

D.

Ability to be used to enforce security

Full Access
Question # 58

An application uses a property to process customer information that is stored in an external

database. some of the customer information changes infrequently.

how do you ensure the property contains the correct customer information at run time?

A.

configure the property to refer to a data page using the SOR patten.

B.

configure the user interface (UI) to refresh the information each time it is rebdered.

C.

configure the property to copy the customer information from a data page using the snap shot patten.

D, configure the property to use a report definition to retrieve the customer information directly.

Full Access
Question # 59

In a Human Resources application, the Social Security Number (SSN) and date of birth details for employees are confidential, and business requirements state that only the HR Manager can see these details.

What is the best approach to mask the information for other users everywhere in the application?

A.

Use the PropertyRead access control policy for the SSN and date of birth.

B.

Add the privilege rule for the UI controls that display the SSN and date of birth.

C.

Add an Access When rule for access role objects of the HR Manager role.

D.

Use the Property Encrypt access control policy for the SSN and date of birth.

Full Access
Question # 60

users complain of difficulty creating a customer service request through facebook massenger. how do you address this issue?

A.

add approximate matches to the response commands for the channel.

B.

add approximate matches to the create case command (s) for the channel.

C.

change the text analyzer configured for the channel.

D.

add response commands to the channel

Full Access
Question # 61

A software training company wants to hold a webinar on a particular subject if a sufficient number of people express an interest in attending. An instructor is tasked with developing the webinar presentation, if they get enough people to register. There is no limit on the number of attendees.

Which case design pattern is the best solution in this scenario?

A.

Divide and Conquer

B.

Sibling Case Update

C.

Data Instance First

D.

Data Instance After

Full Access
Question # 62

XYZ corp has requirement to send an email to every person who has used a certain service in the previous month thanking them for doing business with XYZ. Generating and sending these emails take a certain amount of time XYZ wants these email processed as quickly as possible to avoid interfering with emails sent during business hours.XYZ also wants to ensure that the thank-you email is not sent to the same person twice

PEGACPLSA88V1 question answer

Full Access
Question # 63

An application uses LDAP authentication and create operators dynamically based on a model operate recorded select and move the three options needed to complete the configuration to configuration column

PEGACPLSA88V1 question answer

Full Access
Question # 64

While configuring GetNextWork, overriding the System Settings rule

GetNextWork__WorkBasketUrgencyThreshold imposes a minimum cutoff value for assignment urgency.

Which statement accurately depicts the system behavior when the GetNextWork_WorkBaseketUrgencyThreshold setting is overridden?

A.

The override ignores other criteria in GetNextWork.

B.

The override causes the application to revisit workbaskets for assignments with lower urgency.

C.

The override causes a search of only those assignments with the urgency higher than the threshold value.

D.

The override causes a search of all assignments in a work queue that equal or exceed the set urgency threshold.

Full Access
Question # 65

A healthcare company decides to use Pega Foundation for Healthcare (PFH) for all of their new Pega Platform"" applications, because the data model that PFH provides can accommodate all of their needs. However, some new fields and new data classes need to be created to suit the company's specific processes.

What is the recommended approach to extending the foundation data model?

A.

Create a copy of the foundation data model in the Pega Platform application. Then use direct inheritance to extend the copied data model.

B.

Extend the provided data model by using direct inheritance. Pattern inheritance can be used to extend application-specific behavior.

C.

Create a copy of the foundation data model in the Pega Platform application. Then use pattern inheritance to extend the copied data model.

D.

Extend the provided data model by using pattern inheritance. Direct inheritance can be used to extend application-specific behavior.

Full Access
Question # 66

In the Answer Area, drag each use case on the left to the appropriate locking strategy on the right.

Full Access
Question # 67

You oversee a medium-sized development team, and some of the team members are new to using Pega Platform. What are the two most efficient ways to ensure that the rules the team creates adhere to best practices? (Choose Two)

A.

Have new team members create and run automated Pega unit tests against their rules.

B.

Run the Tracer tool on each rule the new team members check in to identify an failures In rule execution.

C.

Use the rule check-in approval process to review the changes that the new team members make.

D.

Use the Pega Log Analyzer to identify exceptions that are associated with the new team members.

Full Access
Question # 68

A health insurance application receives a weekly feed of customer insurance quotes as CSV files from each partner company. Which of the following options is the best solution to create policy cases based on the received customer insurance quotes?

A.

Use file listener to read the file, and then feed the data from file into a datatype. Configure a Job scheduler to read the records and place them in a queue to create the cases.

B.

Use file listener to read the file, and then invoke the pxCreateTopCase utility to create case immediately.

C.

Use file listener to read the file, and then feed the data from file into a datatype. Invoke the pxCreateTopCase utility to create case.

D.

Use file listener to read the file, and then feed the data from file into a datatype. Configure a job scheduler to read the records and create cases.

Full Access
Question # 69

A Pega COE team is building a reusable component for a functionality that will be mandatory for all Pega applications that are built for the different departments of a company.

The component functionality is documented and published in a common SharePoint file, so that it is accessible by all Pega developers within the company.

Which one of the following approaches will work best for this use case?

A.

The component should be embedded in the enterprise application, so that it does not need to be embedded in the department applications.

B.

The component should be embedded in the enterprise application, and should also be embedded in the department applications.

C.

The component should be placed in a separate application so that the departments can all integrate with that application when they want to run the functionality.

D.

The component should not be embedded in the enterprise application. Instead, each department should include the component in their own application.

Full Access
Question # 70

A security requirement states that personal data should only be visible to managers in the HR

organization. All personal data is contained in a single section.

How do you restrict access to personal data ?

A.

configure a visible when rule on the section

B.

Create an Access control policy restricting access to the properties

C.

Add an Access when to relevent properties.

D.

Define a privilege for the section and add the privilege to appropriate roles

Full Access
Question # 71

A local ferry service offers a passenger boat trip that travels from Port A to Port B, and then back again, once a day. Passengers can book tickets using an app, and they often try to make last-minute reservations for the outbound trip. The ferry service wants their app to place a passenger on a waiting list for the first trip, while guaranteeing them a reservation for the second trip.

Which two case design patterns apply to this scenario? (Choose Two)

A.

Limited Availability and Concurrency

B.

Parallel Case Processing

C.

Divide and Conquer

D.

Data Instance First

Full Access